Shared Flashcard Set

Details

Networking Test 3
Test 3
41
Computer Networking
Undergraduate 4
10/13/2016

Additional Computer Networking Flashcards

 


 

Cards

Term
On circuit switched portions of a PSTN, what set of standards established by the ITU is used to handle call signaling?
 
 
 
a. 
 
b. 
 
c. 
 
d. 
Definition
a. SS7
Term

 

At what layer of the OSI model does the IPsec encryption protocol operate?
 
 
 
a. 
 
b. 
 
c. 
 
d. 
Definition
d. Network Layer
Term

What two terms below are used to describe an analog-to-digital voice conversion device that accepts and interprets both analog and digital voice signals?

a. ePBX

b. digital PBX

c. ATA PBX

d. IP PBX

Definition
b. digital PBX and d. IP PBX
Term
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?
 
a. 
 
b. 
 
c. 
 
d. 
Definition
d. SSTP
Term

 

Which of the following is NOT one of the three AAA services provided by RADIUS and TACACS+?

 
a. 

Authentication

 
b. 

Authorization

 
c. 

Access control

 
d. 

Accounting

Definition
c. Access Control
Term
What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in a direct connection, such as when a client computer connects to a server at an ISP using a dial-up or DSL connection and modem?
   
 
a. 
 
b. 
 
c. 
 
d. 
Definition
b. PPP and d. SLIP
Term

 

The key management phase of IPSec is reliant on which two services below?
 
a. 
 
b. 
 
c. 
 
d. 
Definition
b. IKE and d. ISAKMP
Term

What feature of Windows Server allows for agentless authentication?

 
 
 
a. 

IDS (intrusion detection system)

 
b. 

Network-based firewall

 
c. 

ACL (access control list)

 
d. 

Active Directory

Definition
d. Active Directory
Term

 

When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?
 
 
 
a. 
 
b. 
 
c. 
 
d. 
Definition
d. expedited forwarding
Term

RTP and RTCP operate at which layer of the OSI model?

   
 
a. 

Transport layer

 
b. 

Application layer

 
c. 

Network layer

 
d. 

Data Link layer

Definition
b. Application Layer
Term
What security standard below was created to protect credit card data and transactions, requiring network segmentation as part of security controls?
 
 
 
a. 
 
b. 
 
c. 
 
d. 
Definition
b. PCI DSS
Term

 

Networks that use ________________, such as T-1 or DSL connections to the Internet, are vulnerable to eavesdropping at a building s demarc (demarcation point), at a remote switching facility, or in a central office.
Definition
leased public lines
Term
What two log files are used by older versions of Unix and newer version of Linux to store log information?
   
 
a. 
 
b. 
 
c. 
 
d. 
Definition
c. /var/log/messages and d. /var/log/syslog
Term

 

At what layer of the OSI model do proxy servers operate?

   
 
a. 

Layer 2

 
b. 

Layer 3

 
c. 

Layer 4

 
d. 

Layer 7

Definition
d. Layer 7
Term

 

What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
   
 
a. 
 
b. 
 
c. 
 
d. 
Definition
a. TKIP
Term

 

Which element of H.323 is a device that provides translation between network devices running the H.323 signaling protocols and devices running other types of signaling protocols?
   
 
a. 
 
b. 
 
c. 
 
d. 
Definition
d. H.323 gateway
Term

 

Which cloud computing service model gives software developers access to multiple operating systems for testing?

   
 
a. 

PaaS

 
b. 

IaaS

 
c. 

SaaS

 
d. 

XaaS

Definition
a. PaaS
Term

Which tunneling protocol is accepted and used by multiple vendors?

   
 
a. 

L2TP

 
b. 

SSL

 
c. 

SSL VPN

 
d. 

SSH

Definition
a. L2TP
Term

 

What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?
   
 
a. 
 
b. 
 
c. 
 
d. 
Definition
d. EAP
Term

 

What two terms below describe a network device with three ports, two of which send and receive all traffic, and the third port mirrors the traffic?
 
a. 
 
b. 
 
c. 
 
d. 
Definition
a. packet sniffer and b. network tap
Term
SNMP messages can be secured with ________, in which case agents receive requests on port UDP 10161, and the NMS receives responses and traps on UDP 10162.
Definition
TLS
Term

 

What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire?
   
 
a. 
 
b. 
 
c. 
 
d. 
Definition
virtual wire mode
Term

 

CALEA requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities. (T/F)
Definition
True
Term
What protocol enables multiple types of Layer 3 protocols to travel over any one of several connection-oriented Layer 2 protocols?
   
 
a. 
 
b. 
 
c. 
 
d. 
Definition
c. MPLS
Term
What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?
 
a. 
 
b. 
 
c. 
 
d. 
Definition
a. EAP
Term

 

What component of SIP is a server that responds to user agent clients' requests for session initiation and termination?
 
a. 
 
b. 
 
c. 
 
d. 
Definition
user agent server
Term

 

What service in Windows Server 2012 R2 authenticates remote users and computers to the Windows domain and its corporate network resources?

 
a. 

DirectAccess

 
b. 

Group Policy

 
c. 

Active Directory

 
d. 

RAS (Remote Access Service)

Definition
Direct Access
Term

 

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
   
 
a. 
 
b. 
 
c. 
 
d. 
Definition
a. VPN gateway
Term

Which tunneling protocol is accepted and used by multiple vendors?

   
 
a. 

SSL

 
b. 

SSH

 
c. 

L2TP

 
d. 

SSL VPN

Definition
c. L2TP
Term
After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel. (T/F)
 
Definition
False
Term

 

One of your coworkers downloaded several, very large video files for a special project she’s working on for a new client. When you run your network monitor later this afternoon, what list will your coworker’s computer likely show up on?

   
 
a. 

Top listeners

 
b. 

Top talkers

 
c. 

Discarded packets

 
d. 

Event Viewer

Definition
a. Top Listeners
Term
The _________________ cloud service model provides virtual environments online that can be tailored to the needs of developers.
Definition
Platform as a Service (PaaS)
Term

 

What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in a direct connection, such as when a client computer connects to a server at an ISP using a dial-up or DSL connection and modem?
   
 
a. 
 
b. 
 
c. 
 
d. 
Definition
SLIP and PPP
Term

 

What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
   
:
a. 
 
b. 
 
c. 
 
d. 
Definition
SaaS
Term

 

After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel. (T/F)
 
Definition
False
Term
Which software below combines known scanning techniques and exploits to allow for hybrid exploits?
   
 
a. 
 
b. 
 
c. 
 
d. 
Definition
metasploit
Term
The ________________ utility is a Windows console that is used to control what users do and how the system can be used.
Definition
gpedit.msc
Term
The _____________ proxy server software is available for use on the UNIX / Linux platform.
Definition
SQUID
Term

 

One aspect of the __________________ regulation addresses the security and privacy of medical records, including those stored or transmitted electronically.
Definition
HIPAA (Health Insurance Portability and Accountability Act)
Term
What two terms below are used to describe an analog-to-digital voice conversion device that accepts and interprets both analog and digital voice signals?
 
a. 
 
b. 
 
c. 
 
d. 
Definition
digital PBX and IP PBX
Term

 

What component of SIP is a server that responds to user agent clients' requests for session initiation and termination?
   
 
a. 
 
b. 
 
c. 
 
d. 
Definition
user agent server
Supporting users have an ad free experience!